RBAC: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
mNo edit summary |
||
Line 1: | Line 1: | ||
{{TOCright}} | {{TOCright}} | ||
Role Based Access Control (RBAC) is a model for giving a user access to one or more resources. | Role Based Access Control (RBAC) is a model for giving a user access to one or more resources. | ||
<br>NIST CSRC RBAC is the de facto implementation <ref>[https://csrc.nist.gov/Projects/Role-Based-Access-Control NIST - CSRC] National Institute of Standards and Technology - Computer Security Resource Center - Role Based Access Control]</ref> | |||
== Introduction == | == Introduction == | ||
Line 8: | Line 9: | ||
* Reduces cost of administration. | * Reduces cost of administration. | ||
The NIST RBAC Model uses a limited set of concepts to define an RBAC system as depicted below. | {| class="wikitable" width="1200px" | ||
<br>The system has (1) users, users have (2) sessions and sessions and users have (3) roles assigned to them. | |- style="vertical-align:top;" | ||
<br>Each role consist of (4) permissions and permissions are based on (5) objects and (6) operations. | | width="600px" | | ||
[[File:NIST-RBAC.png|thumb|595px|center|RBAC]] | |||
| width="600px" | | |||
[[File:NIST-RBAC-Entity-Relationship.png|thumb|595px|center|Entity Relationship]] | |||
|- style="vertical-align:top;" | |||
| The NIST RBAC Model uses a limited set of concepts to define an RBAC system as depicted below. <br>The system has (1) users, users have (2) sessions and sessions and users have (3) roles assigned to them. <br>Each role consist of (4) permissions and permissions are based on (5) objects and (6) operations. | |||
| The model contains 6 main entities: | |||
# user: this contains all the user data | |||
# session: this contains the session data for all currently logged on users | |||
# role: this contains all the roles that are defined | |||
# permissions: this contains all the permissions based on objects and operations | |||
# object: objects are the items that require protection | |||
# operation: operations are the actions that are performed on the objects | |||
|} | |||
1) Model and Entity Relation taken from Mind-it <ref>[https://www.mind-it.info/2010/01/09/nist-rbac-data-model Mind-it], NIST RBAC Data Model</ref> | |||
Revision as of 16:29, 6 August 2018
Role Based Access Control (RBAC) is a model for giving a user access to one or more resources.
NIST CSRC RBAC is the de facto implementation [1]
Introduction
RBAC is an access control mechanism which:
- Describes complex access control policies,
- Reduces errors in administration,
- Reduces cost of administration.
1) Model and Entity Relation taken from Mind-it [2]
See also
- NIST CSC RBAC, National Institute of Standards and Technology (NIST), Computer Security Resource Center (CSRC) Role Base Access Control (RBAC) Presentation.
Reference
- ↑ NIST - CSRC National Institute of Standards and Technology - Computer Security Resource Center - Role Based Access Control]
- ↑ Mind-it, NIST RBAC Data Model